CR1337 on X: "The roots of cryptocurrencies; older than most people think. For example let's take this research essay by NSA employees from 1997: 'How to make a mint: The cryptography of
![SHA-256 and SHA3-256 Are Safe For the Foreseeable Future - Darknet - Hacking Tools, Hacker News & Cyber Security SHA-256 and SHA3-256 Are Safe For the Foreseeable Future - Darknet - Hacking Tools, Hacker News & Cyber Security](https://www.darknet.org.uk/wp-content/uploads/2016/10/SHA-256-and-SHA3-256-Are-Safe-For-the-Foreseeable-Future-640x360.jpg)
SHA-256 and SHA3-256 Are Safe For the Foreseeable Future - Darknet - Hacking Tools, Hacker News & Cyber Security
![Why the NSA abandoned the SHA-2 hashing algorithm technology and why Satoshi modified it to create Bitcoin? Why the NSA abandoned the SHA-2 hashing algorithm technology and why Satoshi modified it to create Bitcoin?](https://cdn.publish0x.com/prod/fs/images/cdcb8842f439f1c1b008703c1f09ae740377b0315fa42c9bab49641b3fbd2f40.jpg)